Efficient Authentication in RFID Devices Using Et Alas Algorithm

1
Dr. Vinita Sharma
Dr. Vinita Sharma
2
Jitendra Kumar Gupta
Jitendra Kumar Gupta
3
K. K. Mishra
K. K. Mishra
1 SR Group of Institution, CSE Campus Jhansi, India.

Send Message

To: Author

GJCST Volume 12 Issue E16

Article Fingerprint

ReserarchID

CSTNWSH50SI

Efficient Authentication in RFID Devices Using Et Alas Algorithm Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Security plays a vital role during the transmission of private data from one sender to the other. Although there are many security algorithms implemented but here we are providing the security algorithms on the RFID devices. The authentication techniques implemented in RFID is based on the new algorithm based on smart cards. The data send through the tags can be made secure using the proposed algorithm so that the un-authorised users can’t access the data without any further unique numbers.

20 Cites in Articles

References

  1. (2022). Survey on Context Aware Computing and IoT Environment.
  2. Security improvement in authentication protocol for gen-2 based rfid system, liangmin wang, xiaoluo yi, chao lv, yuanbo guo.
  3. Security analysis on a family of ultra-lightweight rfid authentication protocols tieyan li.
  4. G (2005). Cryptography in radio frequency identification and fair exchange protocols.
  5. H Chien,C Chen (2007). Mutual authentication protocol for rfid conforming to epc class 1 generation 2 standards.
  6. H,K Kim (2006). Enhanced mutual authentication protocol for low-cost rfid.
  7. K Kim (2006). Enhancing security of epcglobal gen-2 rfid tag against traceability and cloning.
  8. T,B Medeiros (2007). Forward secure rfid authentication and key exchange.
  9. S Kinoshita (2003). Cryptographic approach to "privacy-friendly" tags.
  10. Pedro Peris-Lopez,Julio Cesar Hernandez-Castro,Juan Estevez-Tapiador,Arturo Ribagorda (2006). Lightweight Cryptography for Low-Cost RFID Tags.
  11. P Peris-Lopez,J Hernandez-Castro,J (2006). ribagorda. m2ap: a minimalist mutual-authentication protocol for low-cost rfid tags.
  12. P Peris-Lopez,J Hernandez-Castro,J Ribagorda (2006). emap: an efficient mutual authentication protocol for low-cost rfid tags.
  13. M,S Kinoshita (2004). RFID Privacy Protection Scheme for Secure Ubiquitous Computing.
  14. G Tsudik (2006). Ya-trap: yet another trivial rfid authentication protocol.
  15. Stephen Weis,Sanjay Sarma,Ronald Rivest,Daniel Engels (2003). Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems.
  16. Boyeon Song (2008). chris j mitchell "rfid authentication protocol for low-cost tags" wisec'08.
  17. Tieyan Li,Guilin Wang,Robert Deng (2008). Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols.
  18. Md,Hoque (2010). protecting privacy and ensuring security of rfid systems using private authentication protocols.
  19. E Yoon,Yoo (2005). More efficient and secure remote user authentication scheme using smart card.
  20. Y Liou,J Lin,S Wang (2006). A New Dynamic ID Based Remote User Authentication.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Dr. Vinita Sharma. 2012. \u201cEfficient Authentication in RFID Devices Using Et Alas Algorithm\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 12 (GJCST Volume 12 Issue E16): .

Download Citation

Issue Cover
GJCST Volume 12 Issue E16
Pg. 17- 22
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
Not Found
Version of record

v1.2

Issue date

December 19, 2012

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 9649
Total Downloads: 2652
2026 Trends
Research Identity (RIN)
Related Research

Published Article

Security plays a vital role during the transmission of private data from one sender to the other. Although there are many security algorithms implemented but here we are providing the security algorithms on the RFID devices. The authentication techniques implemented in RFID is based on the new algorithm based on smart cards. The data send through the tags can be made secure using the proposed algorithm so that the un-authorised users can’t access the data without any further unique numbers.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Efficient Authentication in RFID Devices Using Et Alas Algorithm

Dr. Vinita Sharma
Dr. Vinita Sharma SR Group of Institution, CSE Campus Jhansi, India.
Jitendra Kumar Gupta
Jitendra Kumar Gupta
K. K. Mishra
K. K. Mishra

Research Journals